In this walk through, we will be going through the Client side filtering vulnerability section from Webgoat Labs. We will be exploring and exploiting Client side filtering in Salary manager application and online product page and learn how application are affected because of it. So, let’s get started with the Hacking without any delay.
Table of Contents
1. Salary manager
- In this challenge, we have to find the salary of the company’s CEO which is not in the front end to view.
- I just search the name of the CEO in the Dev Tools inspector search and got a hit. The employee records were blocked to display in front end using CSS. Submit the salary value to complete the challenge.
2. No Payment
- In this challenge, we have to try to purchase the phone for free.
- I checked out the coupon code field in the HTML souce code and found bunch of checkout codes. Tried all them however was unable to purchase the phone for free.
- Then, i observed the entered coupoun code in the dev tools network tab and found out that the application is issuing a GET Request to /WebGoat/clientSideFiltering/challenge-store/coupons/ endpoint to get the coupon code value.
- So, i designed a GET Request on the target endpoint. Changed the content-type header to application/json and send the request. In the response, i received all the available coupon codes. The last one has a discount of 100%. Using that completed our challenge.
Also Read: Webgoat – Admin password reset
Conclusion:
So, we finally completed the Webgoat Client side filtering Vulnerability section. Next, we can mitigate these types of attacks by processing data more on the server side and not give the user the access to interfere with the application’s logic by manipulating data on client side. On that note, i will take your leave and will meet you in next one with another Webgoat vulnerability writeup, till then “Keep Hacking”.